A DoS-limiting network architecture

  • Authors:
  • Xiaowei Yang;David Wetherall;Thomas Anderson

  • Affiliations:
  • University of California, Irvine;University of Washington;University of Washington

  • Venue:
  • Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on capabilities in which senders obtain short-term authorizations from receivers that they stamp on their packets. We address the full range of possible attacks against communication between pairs of hosts, including spoofed packet floods, network and host bottlenecks, and router state exhaustion. We use simulation to show that attack traffic can only degrade legitimate traffic to a limited extent, significantly outperforming previously proposed DoS solutions. We use a modified Linux kernel implementation to argue that our design can run on gigabit links using only inexpensive off-the-shelf hardware. Our design is also suitable for transition into practice, providing incremental benefit for incremental deployment.